CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,099 results Clear all
CVE-2021-22037 7.8 HIGH EPSS 0.00
Vmware Installbuilder < 21.6.0 - Uncontrolled Search Path
Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.
CWE-427 Oct 29, 2021
CVE-2021-30359 7.8 HIGH 1 Writeup EPSS 0.00
Harmony Browse & SandBlast Agent <90.08.7405 - Privilege Escalation
The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges.
CWE-427 Oct 22, 2021
CVE-2021-38469 9.1 CRITICAL EPSS 0.00
Auvesy versiondog <= 8.0.0 - DLL Hijacking
Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
CWE-427 Oct 22, 2021
CVE-2021-42103 7.8 HIGH EPSS 0.00
Trendmicro Apex One - Uncontrolled Search Path
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42101.
CWE-427 Oct 21, 2021
CVE-2021-42102 7.8 HIGH EPSS 0.00
Trendmicro Apex One - Uncontrolled Search Path
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service agents could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CWE-427 Oct 21, 2021
CVE-2021-42101 7.8 HIGH EPSS 0.00
Trendmicro Apex One - Uncontrolled Search Path
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42103.
CWE-427 Oct 21, 2021
CVE-2021-35982 7.3 HIGH EPSS 0.00
Acrobat Reader DC <2021.005.20060 - RCE
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. A local attacker with non-administrative privileges can plant a malicious DLL to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction.
CWE-427 Sep 29, 2021
CVE-2021-32466 7.0 HIGH EPSS 0.00
Trendmicro Housecall For Home Networks - Uncontrolled Search Path
An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
CWE-427 Sep 29, 2021
CVE-2021-40981 7.3 HIGH EPSS 0.00
ASUS ROG Armoury Crate Lite <4.2.10 - Privilege Escalation
ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory.
CWE-427 Sep 27, 2021
CVE-2021-28130 7.8 HIGH EPSS 0.00
Dr.Web Firewall <12.5.2.4160 - Privilege Escalation
Dr.Web Firewall 12.5.2.4160 on Windows incorrectly restricts applications signed by Dr.Web. A DLL for a custom payload within a legitimate binary (e.g., frwl_svc.exe) bypasses firewall filters.
CWE-427 Sep 24, 2021
CVE-2021-26750 7.8 HIGH EPSS 0.00
Pandasecurity Panda Adaptive Defense 360 - Uncontrolled Search Path
DLL hijacking in Panda Agent <=1.16.11 in Panda Security, S.L.U. Panda Adaptive Defense 360 <= 8.0.17 allows attacker to escalate privileges via maliciously crafted DLL file.
CWE-427 Sep 23, 2021
CVE-2021-31847 8.2 HIGH EPSS 0.00
Mcafee Agent < 5.7.4 - Uncontrolled Search Path
Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature.
CWE-269 Sep 22, 2021
CVE-2021-36216 7.8 HIGH EPSS 0.00
LINE for Windows <6.2.1.2289 - RCE
LINE for Windows 6.2.1.2289 and before allows arbitrary code execution via malicious DLL injection.
CWE-427 Sep 08, 2021
CVE-2021-28581 7.3 HIGH EPSS 0.00
Adobe Creative Cloud < 5.3 - Uncontrolled Search Path
Adobe Creative Cloud Desktop 3.5 (and earlier) is affected by an uncontrolled search path vulnerability that could result in elevation of privileges. Exploitation of this issue requires user interaction in that a victim must log on to the attacker's local machine.
CWE-427 Sep 08, 2021
CVE-2021-22775 7.8 HIGH EPSS 0.00
GP-Pro EX <V4.09.250 - Code Injection
A CWE-427: Uncontrolled Search Path Element vulnerability exists in GP-Pro EX,V4.09.250 and prior, that could cause local code execution with elevated privileges when installing the software.
CWE-427 Sep 02, 2021
CVE-2021-20793 7.8 HIGH EPSS 0.00
Sony Audio USB Driver <V1.10 - Privilege Escalation
Untrusted search path vulnerability in the installer of Sony Audio USB Driver V1.10 and prior and the installer of HAP Music Transfer Ver.1.3.0 and prior allows an attacker to gain privileges and execute arbitrary code via a Trojan horse DLL in an unspecified directory.
CWE-427 Aug 26, 2021
CVE-2021-28594 7.8 HIGH EPSS 0.06
Adobe Creative Cloud Desktop Application - Uncontrolled Search Path
Adobe Creative Cloud Desktop Application (installer) version 2.4 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Aug 24, 2021
CVE-2021-28636 7.3 HIGH EPSS 0.01
Adobe Acrobat DC < 21.005.20054 - Uncontrolled Search Path
Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker with access to the victim's C:/ folder could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Aug 20, 2021
CVE-2021-28595 7.8 HIGH EPSS 0.02
Adobe Dimension < 3.4 - Uncontrolled Search Path
Adobe Dimension version 3.4 (and earlier) is affected by an Uncontrolled Search Path Element element. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Aug 20, 2021
CVE-2021-37617 7.3 HIGH EPSS 0.00
Nextcloud Desktop < 3.3.0 - Uncontrolled Search Path
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. The Nextcloud Desktop Client invokes its uninstaller script when being installed to make sure there are no remnants of previous installations. In versions 3.0.3 through 3.2.4, the Client searches the `Uninstall.exe` file in a folder that can be written by regular users. This could lead to a case where a malicious user creates a malicious `Uninstall.exe`, which would be executed with administrative privileges on the Nextcloud Desktop Client installation. This issue is fixed in Nextcloud Desktop Client version 3.3.0. As a workaround, do not allow untrusted users to create content in the `C:\` system folder and verify that there is no malicious `C:\Uninstall.exe` file on the system.
CWE-427 Aug 18, 2021